Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 23:47
Static task
static1
Behavioral task
behavioral1
Sample
544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe
-
Size
335KB
-
MD5
544d2a3215835faca58328ba66bdb14d
-
SHA1
7041a02c12b5f633a325fce1d3aeab7b56dfe654
-
SHA256
edb49ead0fba64c9c35b15c7b42f8fd5856fde4d89a5eeeef529f06c23521f3f
-
SHA512
62accdf6684a54eab333ea61df36ccf7fe98539702d78aff712a63f822163316c2e1ba5b7372065e17681ce5eaf50915c6c47f3f525edb5084dc2a069292087b
-
SSDEEP
6144:DqhI966AGkAjOpoaY7pGjKa7nuuMdERxSjRSAo2PO4N2Dk:D2q6xGJOpqpaL86ORST4X2w
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\grmynj.sys 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe -
Server Software Component: Terminal Services DLL 1 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\MSMedia\Parameters\ServiceDll = "%SystemRoot%\\System32\\grmynj.dll" 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\MSMedia\Parameters\ServiceDll = "%SystemRoot%\\System32\\grmynj.dll" 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\CONTROLSET003\Services\MSMedia\Parameters\ServiceDll = "%SystemRoot%\\System32\\grmynj.dll" 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 4980 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 5080 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe 4980 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\0004fe30.inf 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe File created C:\Windows\SysWOW64\grmynj.dll 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 676 Process not Found -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4980 svchost.exe 4980 svchost.exe 4980 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\544d2a3215835faca58328ba66bdb14d_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Server Software Component: Terminal Services DLL
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5080
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k MSMedia1⤵
- Deletes itself
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD5f8b803cfc8c74af3f26defb91fdef23c
SHA131322ff940413cfa6a164d84c041a5b5507927f3
SHA256d0c454332d6a4bec9f618b9459b83af8c60a1a632d615a8878e09f125095f0cf
SHA512e087223249a64ac2e369e7419b07238ddeb8a16292cc1dacee9d25eb8aa3085b8bc5d4aca83965b639e0dcbc04af954a01fd10bd69742c45eff1bfba54ed16bd